×

Monitoring for fraudulent or harmful behavior in applications being installed on user devices

  • US 10,419,222 B2
  • Filed: 06/10/2014
  • Issued: 09/17/2019
  • Est. Priority Date: 06/05/2012
  • Status: Active Grant
First Claim
Patent Images

1. A system, comprising:

  • a data repository storing known behaviors associated with known software code components of at least one application associated with at least one user device;

    at least one processor; and

    memory storing instructions configured to instruct the at least one processor to;

    monitor at least one application, including a first application, for installation on user devices including a first user device;

    evaluate authenticity of the first application to provide a result, the evaluating comprising;

    determining a plurality of software code components of the first application, the components including a first component and a second component,attributing a first behavior to the first component,attributing a second behavior to the second component,comparing, by accessing the data repository, behaviors associated with each of the software code components with the known behaviors, the comparing comprising comparing the first behavior to a first known behavior and comparing the second behavior to a second known behavior,assessing a context of the first user device when a signing identifier used to sign the first application is observed, the context based on trust factors corresponding to a state of the first user device, wherein the trust factors comprise a first factor directed to whether the first user device is protected by an anti-malware software application, a second factor directed to identifying a third application being accessed by a web browser running on the first user device, and determining whether the third application being accessed by the web browser is a security threat, and a third factor related to a security feature of the first application,determining a usage history of the signing identifier, the history comprising signing of a second application by the signing identifier, the second application installed on a second user device, andcomparing, by accessing the data repository, at least one behavior of the first application and a stored known behavior of the second application; and

    in response to the result, sending a report to a computing device other than the first user device, the report including an identification of an undesired behavior of the first application based on the result from the evaluating.

View all claims
  • 7 Assignments
Timeline View
Assignment View
    ×
    ×